-
With the benefit of historical hindsight a few years from now, we may look back on March 2016 as a turning point in the debate over encryption, surveillance and civil liberties. The new phase of the deba...
-
The FBI hacks people. What do their warrants look like?
-
First came the motion to compel Apple to unlock the iPhone of one of the San Bernardino shooters; then Apple's motion to vacate; then the government's opposition to that motion. And now we have Apple's r...
-
Don’t look now but a new front is about to open up in the Second Crypto War. The Hill reports that the encryption legislation being drafted by Senate Intelligence Committee leaders Richard Burr and Diann...
-
Here's the brief, which I haven't read yet.
FBI Apple CDCal Govt Reply
-
Just this morning, I was thinking that things have been rather quiet with respect to media coverage of U.S. operations against AQ and AQ affiliates in places like Pakistan, Yemen, and Somalia. Well...
-
Legislators in France are watching closely the fight between Apple and the FBI, but, in the meantime, the French National Assembly has amended a pending counterterrorism bill to impose heavy penalties on...
-
This week on the Lawfare Podcast, the Wilson Center takes on the Apple v. FBI controversy in a panel entitled “Will They or Won’t They? Understanding the Encryption Debate.”
-
Apple's general counsel sounds suspiciously like James Comey when he talks about a small messaging app that competes with his own product.
-
As a young boy, I would sometimes be bullied by my peers. But even worse than the bullying was the perception of being unable to respond. If I said something like "do that again and I'll hit you" the h...
-
The Office of the Director of National Intelligence yesterday released a second set of documents recovered during the raid of Osama bin Laden's compound in Abbottabad, Pakistan. The trance includes 113 n...
-
The reason many technologists fear a negative outcome in the San Bernardino Apple case is because of the possibility the precedent would establish the ability of a court to compel a malicious update.